analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41

Full analysis: https://app.any.run/tasks/056f89f7-e1ad-45f1-91f5-a3b36cbf2f02
Verdict: Malicious activity
Analysis date: October 05, 2022, 04:08:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

EB9C6ACDEDD1E8A8BFD266403BFD520A

SHA1:

C835F8E3FE7F35B7C61CFFE842056BD573CE939B

SHA256:

EBC90F7E16EE51150267C78495D59E3A2A2B3880C7541CA3DF0FF287B528FC41

SSDEEP:

6144:+cVbL0hiIOM8+LDCvzCnQHw67feMv8KiPuTL94:+cVJIOd+vCvnJ8tPuF4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • svchost.exe (PID: 312)
    • Deletes shadow copies

      • cmd.exe (PID: 2704)
      • cmd.exe (PID: 2856)
    • Starts BCDEDIT.EXE to disable recovery

      • cmd.exe (PID: 1504)
    • Loads the Task Scheduler COM API

      • wbengine.exe (PID: 1532)
    • Task Manager has been disabled (taskmgr)

      • svchost.exe (PID: 312)
    • Modifies files in Chrome extension folder

      • svchost.exe (PID: 312)
  • SUSPICIOUS

    • Checks supported languages

      • ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe (PID: 352)
      • svchost.exe (PID: 312)
      • cmd.exe (PID: 2704)
      • cmd.exe (PID: 1504)
      • cmd.exe (PID: 2856)
      • notepad++.exe (PID: 460)
    • Reads the computer name

      • svchost.exe (PID: 312)
      • ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe (PID: 352)
    • Creates files in the user directory

      • ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe (PID: 352)
      • svchost.exe (PID: 312)
    • Starts itself from another location

      • ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe (PID: 352)
    • Creates executable files which already exist in Windows

      • ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe (PID: 352)
      • svchost.exe (PID: 312)
    • Starts CMD.EXE for commands execution

      • svchost.exe (PID: 312)
    • Executed as Windows Service

      • vssvc.exe (PID: 3088)
      • wbengine.exe (PID: 1532)
      • vds.exe (PID: 3772)
      • SearchIndexer.exe (PID: 3824)
    • Creates files in the Windows directory

      • wbadmin.exe (PID: 3108)
    • Executed via COM

      • vdsldr.exe (PID: 2512)
    • Creates files in the program directory

      • SearchIndexer.exe (PID: 3824)
      • svchost.exe (PID: 312)
  • INFO

    • Reads the computer name

      • vssadmin.exe (PID: 2876)
      • explorer.exe (PID: 3380)
      • vssvc.exe (PID: 3088)
      • WMIC.exe (PID: 2132)
      • wbadmin.exe (PID: 3108)
      • wbengine.exe (PID: 1532)
      • vdsldr.exe (PID: 2512)
      • vds.exe (PID: 3772)
      • SearchIndexer.exe (PID: 3824)
      • SearchProtocolHost.exe (PID: 656)
      • SearchFilterHost.exe (PID: 2164)
      • SearchProtocolHost.exe (PID: 1564)
    • Checks supported languages

      • vssadmin.exe (PID: 2876)
      • vssvc.exe (PID: 3088)
      • explorer.exe (PID: 3380)
      • WMIC.exe (PID: 2132)
      • bcdedit.exe (PID: 1748)
      • bcdedit.exe (PID: 2804)
      • wbadmin.exe (PID: 3108)
      • wbengine.exe (PID: 1532)
      • vds.exe (PID: 3772)
      • vdsldr.exe (PID: 2512)
      • NOTEPAD.EXE (PID: 1024)
      • SearchIndexer.exe (PID: 3824)
      • SearchProtocolHost.exe (PID: 656)
      • SearchFilterHost.exe (PID: 2164)
      • SearchProtocolHost.exe (PID: 1564)
    • Manual execution by user

      • explorer.exe (PID: 3380)
      • notepad++.exe (PID: 460)
    • Reads Microsoft Office registry keys

      • SearchProtocolHost.exe (PID: 1564)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2022-Oct-04 21:50:13
Debug artifacts:
  • C:\Users\user\Desktop\Win32.Ransomware.SkynetLocker\SkynetLocker\obj\Debug\SkynetLocker.pdb
FileDescription: -
FileVersion: 0.0.0.0
InternalName: SkynetLocker.exe
LegalCopyright: -
OriginalFilename: SkynetLocker.exe
ProductVersion: 0.0.0.0
Assembly Version: 0.0.0.0

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 128

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 3
TimeDateStamp: 2022-Oct-04 21:50:13
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
8192
64120
64512
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
4.78342
.rsrc
73728
271800
271872
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.75296
.reloc
352256
12
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.74384
270376
UNKNOWN
UNKNOWN
RT_ICON
32512
1.67095
20
UNKNOWN
UNKNOWN
RT_GROUP_ICON
1 (#2)
3.18073
604
UNKNOWN
UNKNOWN
RT_VERSION
1 (#3)
5.00112
490
UNKNOWN
UNKNOWN
RT_MANIFEST

Imports

mscoree.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
65
Monitored processes
21
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe no specs svchost.exe cmd.exe no specs vssadmin.exe no specs vssvc.exe no specs explorer.exe no specs wmic.exe no specs cmd.exe no specs bcdedit.exe no specs bcdedit.exe no specs cmd.exe no specs wbadmin.exe no specs wbengine.exe no specs vdsldr.exe no specs vds.exe no specs notepad++.exe notepad.exe no specs searchindexer.exe no specs searchprotocolhost.exe no specs searchfilterhost.exe no specs searchprotocolhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
352"C:\Users\admin\Desktop\ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe" C:\Users\admin\Desktop\ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
1
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
312"C:\Users\admin\AppData\Roaming\svchost.exe" C:\Users\admin\AppData\Roaming\svchost.exe
ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exe
User:
admin
Integrity Level:
HIGH
Description:
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2704"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy deleteC:\Windows\System32\cmd.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2876vssadmin delete shadows /all /quiet C:\Windows\system32\vssadmin.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssadmin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
3088C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3380"C:\Windows\explorer.exe" C:\Windows\explorer.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
2132wmic shadowcopy deleteC:\Windows\System32\Wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1504"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled noC:\Windows\System32\cmd.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1748bcdedit /set {default} bootstatuspolicy ignoreallfailures C:\Windows\system32\bcdedit.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\bcdedit.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2804bcdedit /set {default} recoveryenabled noC:\Windows\system32\bcdedit.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\bcdedit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
9 631
Read events
7 944
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
914
Text files
180
Unknown types
886

Dropped files

PID
Process
Filename
Type
312svchost.exeC:\Users\Default\SkynetData.txttext
MD5:CA069420F1D43DABBA1630A2477891C7
SHA256:6763E8A512A14AFEFD3BBA63EF0516DBB378436E2BC7D853EAEB7A6FDF5EB090
352ebc90f7e16ee51150267c78495d59e3a2a2b3880c7541ca3df0ff287b528fc41.exeC:\Users\admin\AppData\Roaming\svchost.exeexecutable
MD5:EB9C6ACDEDD1E8A8BFD266403BFD520A
SHA256:EBC90F7E16EE51150267C78495D59E3A2A2B3880C7541CA3DF0FF287B528FC41
312svchost.exeC:\Users\Administrator\NTUSER.DATbinary
MD5:D1457B72C3FB323A2671125AEF3EAB5D
SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1
312svchost.exeC:\ProgramData\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\SkynetData.txttext
MD5:CA069420F1D43DABBA1630A2477891C7
SHA256:6763E8A512A14AFEFD3BBA63EF0516DBB378436E2BC7D853EAEB7A6FDF5EB090
312svchost.exeC:\Users\Administrator\AppData\Local\IconCache.dbbinary
MD5:D1457B72C3FB323A2671125AEF3EAB5D
SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1
312svchost.exeC:\Users\Public\Desktop\CCleaner.lnkbinary
MD5:D1457B72C3FB323A2671125AEF3EAB5D
SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1
312svchost.exeC:\Users\Administrator\AppData\Local\IconCache.db.zs3ugmc
MD5:C329EE5D9A8AAF9624373EF1CA12B5EF
SHA256:13E56AE63DADB2A11C04B77D88A1477D0A0785E2CAB0238C4DD80DC497CCFCAB
312svchost.exeC:\Users\Public\Desktop\Acrobat Reader DC.lnkbinary
MD5:D1457B72C3FB323A2671125AEF3EAB5D
SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1
312svchost.exeC:\Users\Public\Desktop\FileZilla Client.lnkbinary
MD5:D1457B72C3FB323A2671125AEF3EAB5D
SHA256:8A8DE823D5ED3E12746A62EF169BCF372BE0CA44F0A1236ABC35DF05D96928E1
312svchost.exeC:\ProgramData\Adobe\ARM\{291AA914-A987-4CE9-BD63-AC0A92D435E5}\RdrServicesUpdater2.exe.9rg5gmc
MD5:C771D3ED558F01B3CF09B7DFD4E28E0D
SHA256:E85901F82A3A9AAFDA2FC4B2B0D4FE3EBD6DA3F623DE090FEF319A7CCFCB6859
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\plugins\Config\nppPluginList.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe